Term
|
Definition
| A person organization that seeks to obtain or alter data or other assets illegally |
|
|
Term
|
Definition
| An opportunity for threats to gain access to individual or organizational assets |
|
|
Term
|
Definition
| Some measure that individuals or organizations take to block the threat from obtaining the asset. |
|
|
Term
|
Definition
| The asset that is desired by the threat |
|
|
Term
|
Definition
| Human error, Computer crime, Natural events and disasters |
|
|
Term
|
Definition
| Unauthorized data disclosure, incorrect data modification, faulty service, denial of service and loss of infrastructure |
|
|
Term
| Unauthorized data disclosure |
|
Definition
| Occurs when a threat obtains data that is supposed to be protected |
|
|
Term
|
Definition
| Occurs when someone deceives by pretending to be someone else |
|
|
Term
|
Definition
| A similar technique for obtaining unauthorized data that uses pretexting via email |
|
|
Term
|
Definition
| Pretends to be a legitimate company and sends an email requesting confidential data such as account numbers, social security numbers, account passwords, and so forth |
|
|
Term
|
Definition
Another term for someone pretending to be someone else (Pretending to be your professor "spoofing your professor") |
|
|
Term
|
Definition
| Occurs when and intruder uses another's sites IP address to masquerade as that other site |
|
|
Term
|
Definition
| Is a synonym for phishing |
|
|
Term
|
Definition
| Is another term for intercepting computer communications |
|
|
Term
|
Definition
| Take computers with wireless connections through an area and search for unprotected wireless networks |
|
|
Term
|
Definition
| Which is breaking into computers, servers, or networks to steal data such as computer lists product inventory data, employee data and other proprietary confidential data |
|
|
Term
| Incorrect Data Modification |
|
Definition
| Examples- Incorrectly increasing a customer's discount or incorrectly modifying an employee's salary, earned days of vacation, or annual bonus. |
|
|
Term
|
Definition
| Problems that result because of incorrect system operation. Can include incorrect data modification, systems that work incorrectly by sending the wrong goods to a customer or the ordered goods to the wrong customer, incorrectly billing customers, or sending the wrong information to employees |
|
|
Term
|
Definition
| Occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones that shut down legitimate applications and substitute their own processing to spy, steal, and manipulate data or other purposes |
|
|
Term
|
Definition
| Human error in following procedures or a lack of procedures |
|
|
Term
|
Definition
| Examples- A bulldozer cutting a conduit of fiber-optics cables and the floor buffer crashing into a rack of web servers |
|
|
Term
| Advanced persistent Threat (APT) |
|
Definition
| A sophisticated, possibly long running, computer hack that is perpetrated by large, well funded organizations like governments |
|
|
Term
| Intrusion Detections System (IDS) |
|
Definition
| A computer program that senses when another computer is attempting to scan the disk or otherwise access a computer |
|
|
Term
|
Definition
| In which a the password cracker tries every possible combination of characters |
|
|
Term
|
Definition
| Involve the hardware and software components of an information system |
|
|
Term
|
Definition
| A plastic card similar to a credit card they have a microchip which holds far more data than a magnetic strip. Users of smart cards a required to have a PIN to be authenticated |
|
|
Term
|
Definition
| Is the process of transforming clear text into coded, unintelligible text for secure storage or communication. |
|
|
Term
|
Definition
| Procedures for encrypting data that are difficult to break |
|
|
Term
|
Definition
| Number used to encrypt the data |
|
|
Term
|
Definition
| The same key (again a number) is used to encode and to decode |
|
|
Term
|
Definition
| Two keys are used one key encodes the message and the other decodes the message |
|
|
Term
|
Definition
| Is used on the internet with this method each site has a public key for encoding messages and a private key for decoding them |
|
|
Term
|
Definition
| Most secure communications over the internet use this protocol |
|
|
Term
| Secure Socket Layer (SSL) Transport Layer Security(TLS) |
|
Definition
| Uses a combination of public private key and symmetric encryption |
|
|
Term
|
Definition
| Is a computing device that prevents unauthorized network access |
|
|
Term
|
Definition
| Sits outside the organizational network; it is the first device that internet traffic encounters |
|
|
Term
|
Definition
| Inside the organizational network |
|
|
Term
| Packet-filtering Firewall |
|
Definition
| Examines each part of a message and determines whether to let that part pass |
|
|
Term
|
Definition
| Viruses, worms, Trojan horses, spyware, and adware |
|
|
Term
|
Definition
| A computer program that replicates itself |
|
|
Term
|
Definition
| The program code that causes unwanted or harmful activity |
|
|
Term
|
Definition
| Viruses that masquerade as useful programs or files |
|
|
Term
|
Definition
| Virus that propagates using the internet or other computer network |
|
|
Term
|
Definition
| Programs that are installed on the user's computer without the user's knowledge or permission |
|
|
Term
|
Definition
| Similar to spyware but it watches user activity and produce pop-up ads |
|
|
Term
|
Definition
| Protect databases and other organizational data |
|
|
Term
|
Definition
| Refers to an organization wide function that is in charge of developing data policies and enforcing data standards |
|
|
Term
|
Definition
| Refers to a function that pertains to a particular database |
|
|
Term
|
Definition
| Involve the people and procedure components of information system |
|
|